US20020157025A1 - Syntax checker with real-time reedback - Google Patents

Syntax checker with real-time reedback Download PDF

Info

Publication number
US20020157025A1
US20020157025A1 US09/838,619 US83861901A US2002157025A1 US 20020157025 A1 US20020157025 A1 US 20020157025A1 US 83861901 A US83861901 A US 83861901A US 2002157025 A1 US2002157025 A1 US 2002157025A1
Authority
US
United States
Prior art keywords
feedback
password
user
resource
program product
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/838,619
Other versions
US7240339B2 (en
Inventor
Brian Cragun
Gregory Hintermeister
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US09/838,619 priority Critical patent/US7240339B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CRAGUN, BRIAN J., HINTERMEISTER, GREGORY R.
Priority to CA002376341A priority patent/CA2376341A1/en
Publication of US20020157025A1 publication Critical patent/US20020157025A1/en
Application granted granted Critical
Publication of US7240339B2 publication Critical patent/US7240339B2/en
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0489Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using dedicated keyboard keys or combinations thereof
    • G06F3/04895Guidance during keyboard input operation, e.g. prompting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present invention relates to data processing systems. More particularly, the present invention relates to syntax validation.
  • Computer systems vary to a large degree, but a common trait shared by user-based computer systems is the ability to receive information from a user, manipulate it somehow, and present the information back to the user.
  • the information presented to the user by the computer system varies based upon the information provided by the user as input.
  • This input information comes in many forms. It may be nothing more than a double click with a pointing device or it may amount to pages and pages of typewritten text for a paper or a book.
  • This patent involves how a computer system provides feedback to a user when receiving information that has been formatted incorrectly.
  • the problems set forth above are solved by the syntax checker of the present invention.
  • the syntax checker simultaneously provides real-time feedback to the user regarding more than one syntactic requirement. For example, if three rules exist for the entry of format-specific information, the syntax checker of the present invention provides simultaneous feedback to the user regarding success or failure for each of the three rules.
  • the syntax checker of the present invention can be configured by the user to provide feedback about certain rules or rule sets and to omit feedback for other rules or rule sets.
  • a password validation mechanism that checks a password string against the requirements of more than one password-protected resource. For example, if a user wants to use one password to access three different resources, the disclosed password validation mechanism will validate the password string against the password requirements for each of the three resources and provide visual feedback to the user as to the success/failure of the password string for each resource. This visual feedback is provided using three different visual cues.
  • FIG. 1 is a block diagram of the computer system of the preferred embodiment of the present invention.
  • FIG. 2A is a flow diagram that shows steps used to carry out the password validation mechanism of the preferred embodiment of the present invention.
  • FIG. 2B is a block diagram that shows the password validation record of the preferred embodiment of the present invention.
  • FIGS. 3A through 3C are example screen shots of the visual cues used in the preferred embodiment.
  • FIG. 1 shows a block diagram of the computer system of the preferred embodiment.
  • the computer system of the preferred embodiment is an enhanced IBM Personal Computer 300PL. While computer system 100 is used as a client computer system within an IBM® eServer iSeries network, those skilled in the art will appreciate that the mechanisms and apparatus of the present invention apply equally to any computer system, regardless of whether the computer system is a complicated multi-user computing apparatus, a single user workstation, or a handheld device.
  • computer system 100 comprises main or central processing unit (CPU) 105 connected to memory 135 and network adapter 110 . These system components are interconnected through the use of system bus 130 .
  • CPU central processing unit
  • Operating system 140 of the preferred embodiment is the multitasking operating system known in the industry as Windows 2000®, which is licensed by Microsoft Corporation. However, those skilled in the art will appreciate that the spirit and scope of the present invention is not limited to any one operating system.
  • Operations Navigator 160 which is licensed by IBM Corporation. Operations Navigator 160 is used within an IBM eServer iSeries networked computer system to provide graphical user interface access from client to server.
  • syntax checker Within Operations Navigator 160 is the syntax checker of the preferred embodiment. The syntax checker is represented by the combination of Password Validation Mechanism 165 (PVM 165 ) and Password Validation Records 168 .
  • Network adapter 110 is used to allow computer system 100 to participate in the network of the eServer iSeries system.
  • FIG. 2A is a flow diagram that shows steps used to carry out PVM 165 of the preferred embodiment of the present invention.
  • PVM 165 receives a password change event.
  • a password change event is any user action that causes one or more characters within a password string to change. Examples include adding a character, deleting a character, pasting one or more new characters on top of one or more existing characters.
  • PVM 165 executes once per resource per character change. So, if there are three resources at issue and the user is entering the fourth character of a password string, PVM 165 will have already executed at least eleven times.
  • a password in the preferred embodiment is a string of one or more characters.
  • PVM 165 loads the first password validation record.
  • the preferred embodiment uses one password validation record for each resource type.
  • Password validation record 265 of the preferred embodiment is shown in FIG. 2B.
  • Password Validation Record 265 is one of Password Validation Records 168 .
  • Icon position field 267 is used to store the display position of the success or failure icon for the password-protected resource that is represented by the particular password validation record.
  • Success and failure icon fields ( 269 and 271 respectively) are used to store the respective success and failure icons for the password-protected resource at issue.
  • Success and failure message fields ( 273 and 275 respectively) are similarly used to store the respective success and failure messages for the password-protected resource at issue.
  • Feedback enabled field 277 is a binary field set by the user to indicate whether feedback is desired to with respect to the particular resource.
  • character success color and failure color fields are used to present the characters to the user in a highlighted fashion.
  • Character success color is black and the character failure color is different for each resource to point out which character(s) is problematic for which resource. If a given character is a problem for more than one resource, its color will be shown based upon the last resource checked.
  • the check routine field is used to specify the program that is to be used to validate the syntax of the particular password for the resource at issue. Said another way, PVM 165 uses this field to invoke a program to check the validity of the password string for the resource represented by the particular password validation record.
  • the last field in password validation record 265 , next record field 285 , is used to chain password validation records together so that PVM 165 can reference and load each password validation record and thereby syntactically check the password string based on the syntactic requirements of each resource.
  • PVM 165 checks whether the user wants feedback for the particular resource. This is accomplished by checking feedback-enabled field 277 of PVR 265 . The exact way in which this field is set by the user is not important to the benefits and advantages of the preferred embodiment, and is therefore, not described herein. If the user does not want feedback for the particular resource, PVM 217 proceeds to block 217 to load the next password validation record.
  • PVM 165 sets the current string of characters to the success color contained in character success color field 279 [processing block 207 ].
  • visual feedback regarding syntactic conformance is provided to the user of the preferred embodiment via three different visual cues.
  • the character-based type of cue involves highlighting problematic characters in the password string in some fashion, while treating successful characters in the standard way (i.e., black in the preferred embodiment). As stated, problem characters can be highlighted through the use of underlining, color, italics, or the manipulation of some other type of character-oriented attribute(s) (color is used in the preferred embodiment).
  • the next type of visual cue involves the use of success/failure messages. These messages are implemented as floating text in the preferred embodiment.
  • the last type of visual cue involves the use of success icons and failure icons for each of resource (see processing blocks 225 and 235 ).
  • PVM 165 invokes the program referenced in check routine field 287 of password validation record 265 to validate the password represented by the current string. This validation is performed based upon the syntactic requirements of the resource represented by the password validation record [processing block 220 ].
  • the information returned from the validation program amounts to a list of problematic characters. Of course, if there are no problematic characters, the current string is determined to be syntactically valid for the particular resource. The returned information is considered in decision block 230 .
  • PVM 165 retrieves the success icon from success icon field 269 of password validation record 265 and places it in the screen position specified by icon position field 267 [processing block 235 ]. PVM 165 also sets the float message for the success icon using success message field 273 so that an appropriate message is displayed when the user hovers a position indicator over the success icon [processing block 245 ]. If errors are reported, PVM 165 retrieves the failure icon from failure icon field 271 of password validation record 265 and places it in the screen position specified by icon position field 267 [processing block 225 ]. PVM 165 also sets the float message for the failure icon using failure message field 275 so that an appropriate message is displayed when the user hovers a pointing device over the failure icon [processing block 240 ]. Problematic characters are then highlighted in processing block 260 .
  • next record field 285 is empty, meaning that there are no more records in the chain (i.e., password-protected resources to check), PVM 165 terminates execution in block 215 . If the next record is loaded successfully, PVM 165 continues processing for the next password-protected resource in [processing block 220 ]. This logic is represented by decision block 210 .
  • FIGS. 3A and 3B show examples of the icon and message cues used in the preferred embodiment.
  • FIG. 3A Shown on FIG. 3A are success icons 300 , 305 , and 310 . Each of these icons represent a particular resource that is available to the user. As shown, the syntax of current password string 315 is simultaneously shown as being correct for each of the three resources at issue. Floating success message 320 is displayed to the user when the user hovers their position indicator (not shown) over success icon 310 .
  • FIG. 3B are success icons 305 , and 310 and failure icon 325 . Again, each of these icons represent a particular resource that is available to the user.
  • Floating failure message 330 is displayed to the user when the user hovers their position indicator (not shown) over failure icon 325 .
  • FIG. 3C shows an example of how character cues are used in the preferred embodiment.
  • FIG. 3C shows what password string 335 would look like if character highlighting were enabled for the 5250 terminal resource.
  • the reader is asked to assume here that proper syntax for the 5250 terminal resource involves only alphabetic characters.
  • the numeric character “1” is shown in highlighted form to help the user identify the problematic character.
  • more highlighting would be used (note: as mentioned, color is used in the preferred embodiment, but underlining is used in FIG. 3C to accommodate black and white patent printing restrictions).
  • substitute characters such as an asterisks (“*”), are highlighted in the case where they are used to obscure passwords for security purposes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A syntax checker that simultaneously provides real-time feedback to the user regarding more than one syntactic requirement is disclosed. The syntax checker can be configured by the user to provide feedback about certain rules or rule sets and to omit feedback for other rules or rule sets. Also disclosed is a password validation mechanism that checks a submitted password string against the requirements of more than one password-protected resource and provides visual feedback to the user regarding success or failure. This visual feedback is provided using three different visual cues.

Description

    FIELD OF THE INVENTION
  • The present invention relates to data processing systems. More particularly, the present invention relates to syntax validation. [0001]
  • BACKGROUND OF THE INVENTION
  • Computer systems vary to a large degree, but a common trait shared by user-based computer systems is the ability to receive information from a user, manipulate it somehow, and present the information back to the user. Generally speaking the information presented to the user by the computer system varies based upon the information provided by the user as input. This input information comes in many forms. It may be nothing more than a double click with a pointing device or it may amount to pages and pages of typewritten text for a paper or a book. In some cases it is important for the user to format the information in a specific way. For example, a computer user who sets a password or who submits a database query must take care to ensure that the input information follows a particular format. If care is not taken, the user password will not be set or the database query will not be valid. This patent involves how a computer system provides feedback to a user when receiving information that has been formatted incorrectly. [0002]
  • Present day feedback mechanisms do inform the user of the improperly formatted password. More sophisticated mechanisms may even be specific about the particular rule that has been violated. The problem, though, is that passwords, like many format-specific items, often have format requirements involving several different rules, and the rules may vary depending upon anticipated uses. For example, a password may be valid on for one resource, but not for another. This means, of course, that the user is told only that there is a format problem, or in the best case that there is a specific formatting problem, but the user is not told whether other formatting rules have been violated. The user, then, may correct one formatting problem only to learn later that the solution to the first problem causes one or more errors relative to other formatting requirements. Naturally, this can make for a very frustrating experience for the user. [0003]
  • Without a way to better inform users regarding formatting problems, user frustration regarding format-specific information entry will persist. [0004]
  • SUMMARY OF THE INVENTION
  • The problems set forth above are solved by the syntax checker of the present invention. The syntax checker simultaneously provides real-time feedback to the user regarding more than one syntactic requirement. For example, if three rules exist for the entry of format-specific information, the syntax checker of the present invention provides simultaneous feedback to the user regarding success or failure for each of the three rules. As a further feature, the syntax checker of the present invention can be configured by the user to provide feedback about certain rules or rule sets and to omit feedback for other rules or rule sets. [0005]
  • Also disclosed is a password validation mechanism that checks a password string against the requirements of more than one password-protected resource. For example, if a user wants to use one password to access three different resources, the disclosed password validation mechanism will validate the password string against the password requirements for each of the three resources and provide visual feedback to the user as to the success/failure of the password string for each resource. This visual feedback is provided using three different visual cues. [0006]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of the computer system of the preferred embodiment of the present invention. [0007]
  • FIG. 2A is a flow diagram that shows steps used to carry out the password validation mechanism of the preferred embodiment of the present invention. [0008]
  • FIG. 2B is a block diagram that shows the password validation record of the preferred embodiment of the present invention. [0009]
  • FIGS. 3A through 3C are example screen shots of the visual cues used in the preferred embodiment. [0010]
  • DESCRIPTION OF THE PREFERRED EMBODIMENT
  • Turning now to the drawings, FIG. 1 shows a block diagram of the computer system of the preferred embodiment. The computer system of the preferred embodiment is an enhanced IBM Personal Computer 300PL. While [0011] computer system 100 is used as a client computer system within an IBM® eServer iSeries network, those skilled in the art will appreciate that the mechanisms and apparatus of the present invention apply equally to any computer system, regardless of whether the computer system is a complicated multi-user computing apparatus, a single user workstation, or a handheld device. As shown in the exploded view of FIG. 1, computer system 100 comprises main or central processing unit (CPU) 105 connected to memory 135 and network adapter 110. These system components are interconnected through the use of system bus 130.
  • [0012] Computer system 100 of the preferred embodiment utilizes well known virtual addressing mechanisms, allowing the programs of computer system 100 to work against a large virtual storage entity instead of against multiple, smaller storage entities. Memory 135 is, however, shown on FIG. 1 as a monolithic entity because the programs of the preferred embodiment are not dependent upon any one type of memory arrangement (i.e., as stated, the present invention may be practiced on a variety of systems from a mainframe computer system to a handheld device).
  • There are a number of programs shown to reside in [0013] memory 135. Operating system 140 of the preferred embodiment is the multitasking operating system known in the industry as Windows 2000®, which is licensed by Microsoft Corporation. However, those skilled in the art will appreciate that the spirit and scope of the present invention is not limited to any one operating system. Also shown in memory 135 is Operations Navigator 160, which is licensed by IBM Corporation. Operations Navigator 160 is used within an IBM eServer iSeries networked computer system to provide graphical user interface access from client to server. Within Operations Navigator 160 is the syntax checker of the preferred embodiment. The syntax checker is represented by the combination of Password Validation Mechanism 165 (PVM 165) and Password Validation Records 168. PVM 165 uses Password Validation Records to simultaneously provide real-time feedback to the user regarding more than one password-related syntactic requirement. However, those skilled in the art will appreciate that the present invention is not limited to password-related syntactic requirements. Indeed other applications of the present inventions are equally appropriate. For example, the present invention could be applied to the multiple syntactic requirements of database formulas, database queries, and/or to compiler driven requirements for converting source code to object code. Lastly, resources 150 are shown in memory 135. In the preferred embodiment, resources 150 are password-protected entities. Database access, file access, applications (e.g., email, etc.), and network access are examples of such password-protected entities.
  • Also shown within [0014] computer system 100 is network adapter 110. Network adapter 110 is used to allow computer system 100 to participate in the network of the eServer iSeries system.
  • It is important to note that while the present invention has been (and will continue to be) described in the context of a fully functional computer system, the mechanisms of the present invention are capable of being distributed as a program product in a variety of forms, and there is no limitation as to the particular type of signal bearing media used to actually carry out the distribution. Examples of signal bearing media include: recordable type media such as floppy disks and CD ROMs and transmission type media such as digital and analog communications links. [0015]
  • FIG. 2A is a flow diagram that shows steps used to carry out [0016] PVM 165 of the preferred embodiment of the present invention. In block 200, PVM 165 receives a password change event. In the preferred embodiment, a password change event is any user action that causes one or more characters within a password string to change. Examples include adding a character, deleting a character, pasting one or more new characters on top of one or more existing characters. As will become clear, PVM 165 executes once per resource per character change. So, if there are three resources at issue and the user is entering the fourth character of a password string, PVM 165 will have already executed at least eleven times. A password in the preferred embodiment is a string of one or more characters.
  • In [0017] processing block 205, PVM 165 loads the first password validation record. As discussed above, the preferred embodiment uses one password validation record for each resource type.
  • [0018] Password validation record 265 of the preferred embodiment is shown in FIG. 2B. Password Validation Record 265 is one of Password Validation Records 168. Icon position field 267 is used to store the display position of the success or failure icon for the password-protected resource that is represented by the particular password validation record. Success and failure icon fields (269 and 271 respectively) are used to store the respective success and failure icons for the password-protected resource at issue. Success and failure message fields (273 and 275 respectively) are similarly used to store the respective success and failure messages for the password-protected resource at issue. Feedback enabled field 277 is a binary field set by the user to indicate whether feedback is desired to with respect to the particular resource. In the preferred embodiment, character success color and failure color fields (279 and 283 respectively) are used to present the characters to the user in a highlighted fashion. Character success color is black and the character failure color is different for each resource to point out which character(s) is problematic for which resource. If a given character is a problem for more than one resource, its color will be shown based upon the last resource checked. The check routine field is used to specify the program that is to be used to validate the syntax of the particular password for the resource at issue. Said another way, PVM 165 uses this field to invoke a program to check the validity of the password string for the resource represented by the particular password validation record. The last field in password validation record 265, next record field 285, is used to chain password validation records together so that PVM 165 can reference and load each password validation record and thereby syntactically check the password string based on the syntactic requirements of each resource.
  • In [0019] processing block 206, PVM 165 checks whether the user wants feedback for the particular resource. This is accomplished by checking feedback-enabled field 277 of PVR 265. The exact way in which this field is set by the user is not important to the benefits and advantages of the preferred embodiment, and is therefore, not described herein. If the user does not want feedback for the particular resource, PVM 217 proceeds to block 217 to load the next password validation record.
  • Assuming here that feedback is desired, [0020] PVM 165 sets the current string of characters to the success color contained in character success color field 279 [processing block 207]. As mentioned in the summary section of this patent, visual feedback regarding syntactic conformance is provided to the user of the preferred embodiment via three different visual cues. The character-based type of cue involves highlighting problematic characters in the password string in some fashion, while treating successful characters in the standard way (i.e., black in the preferred embodiment). As stated, problem characters can be highlighted through the use of underlining, color, italics, or the manipulation of some other type of character-oriented attribute(s) (color is used in the preferred embodiment). The next type of visual cue involves the use of success/failure messages. These messages are implemented as floating text in the preferred embodiment. The last type of visual cue involves the use of success icons and failure icons for each of resource (see processing blocks 225 and 235).
  • Once the character indicators have been set to “success” in [0021] processing block 207, PVM 165 invokes the program referenced in check routine field 287 of password validation record 265 to validate the password represented by the current string. This validation is performed based upon the syntactic requirements of the resource represented by the password validation record [processing block 220]. The information returned from the validation program amounts to a list of problematic characters. Of course, if there are no problematic characters, the current string is determined to be syntactically valid for the particular resource. The returned information is considered in decision block 230. If there are no errors reported, PVM 165 retrieves the success icon from success icon field 269 of password validation record 265 and places it in the screen position specified by icon position field 267 [processing block 235]. PVM 165 also sets the float message for the success icon using success message field 273 so that an appropriate message is displayed when the user hovers a position indicator over the success icon [processing block 245]. If errors are reported, PVM 165 retrieves the failure icon from failure icon field 271 of password validation record 265 and places it in the screen position specified by icon position field 267 [processing block 225]. PVM 165 also sets the float message for the failure icon using failure message field 275 so that an appropriate message is displayed when the user hovers a pointing device over the failure icon [processing block 240]. Problematic characters are then highlighted in processing block 260.
  • Regardless of whether errors were detected in [0022] decision block 230, the execution path of PVM 165 ultimately proceeds to processing block 217 where PVM 165 attempts to load the next password validation record using next record field 285. If next record field 285 is empty, meaning that there are no more records in the chain (i.e., password-protected resources to check), PVM 165 terminates execution in block 215. If the next record is loaded successfully, PVM 165 continues processing for the next password-protected resource in [processing block 220]. This logic is represented by decision block 210.
  • FIGS. 3A and 3B show examples of the icon and message cues used in the preferred embodiment. Shown on FIG. 3A are [0023] success icons 300, 305, and 310. Each of these icons represent a particular resource that is available to the user. As shown, the syntax of current password string 315 is simultaneously shown as being correct for each of the three resources at issue. Floating success message 320 is displayed to the user when the user hovers their position indicator (not shown) over success icon 310. Shown on FIG. 3B are success icons 305, and 310 and failure icon 325. Again, each of these icons represent a particular resource that is available to the user. As shown, the syntax of current password string 335 is correct for the resources represented by success icons 305 and 310, but incorrect for the resource represented by failure icon 325. Floating failure message 330 is displayed to the user when the user hovers their position indicator (not shown) over failure icon 325.
  • FIG. 3C shows an example of how character cues are used in the preferred embodiment. FIG. 3C shows what [0024] password string 335 would look like if character highlighting were enabled for the 5250 terminal resource. For the purposes of explanation, the reader is asked to assume here that proper syntax for the 5250 terminal resource involves only alphabetic characters. Thus, the numeric character “1” is shown in highlighted form to help the user identify the problematic character. Of course, if more than one numeric character had been entered, more highlighting would be used (note: as mentioned, color is used in the preferred embodiment, but underlining is used in FIG. 3C to accommodate black and white patent printing restrictions). It should also be noted that substitute characters, such as an asterisks (“*”), are highlighted in the case where they are used to obscure passwords for security purposes.
  • The embodiments and examples set forth herein were presented in order to best explain the present invention and its practical application and to thereby enable those skilled in the art to make and use the invention. However, those skilled in the art will recognize that the foregoing description and examples have been presented for the purposes of illustration and example only. The description as set forth is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching without departing from the spirit and scope of the following claims. For example, while three different types of visual cues are used in the preferred embodiment, other types of visual cues could be used. Similarly, while visual cues are used in the preferred embodiment other types of cues, like audio or tactile cues, could also be used. [0025]

Claims (18)

What is claimed is:
1. A computer system, said computer system comprising:
a bus;
a central processing unit;
memory, said memory being connected to said central processing unit via said bus; and a syntax checker stored in said memory, said syntax checker providing simultaneous feedback to a user regarding validity of more than one syntactic requirement, said feedback being simultaneously provided for each of said more than one syntactic requirement.
2. The computer system of claim 1, wherein said syntax checker is a password validation mechanism.
3. A computer system, said computer system comprising:
a bus;
a central processing unit;
memory, said memory being connected to said central processing unit via said bus; and a password validation mechanism, said password validation mechanism providing simultaneous feedback to a user regarding validity of a password string for more than one resource.
4. The computer system of claim 1 wherein said password validation mechanism simultaneously provides feedback for each of said more than one resource.
5. The computer system of claim 1 wherein said password validation mechanism simultaneously provides feedback for each resource using more than one visual cue.
6. The computer system of claim 5 wherein said more than one visual cue is selected from the group consisting of icon presentation, message presentation, and character highlighting.
7. A program product, said program product comprising:
signal bearing media; and
a program product disposed on said signal bearing media, said program product being a syntax checker, said syntax checker providing simultaneous feedback to a user regarding validity of more than one syntactic requirement, said feedback being simultaneously provided for each of said more than one syntactic requirement.
8. The program product of 7, wherein said syntax checker is a password validation mechanism.
9. A program product, said program product comprising:
signal bearing media;
a program product disposed on said signal bearing media, said program product being a password validation mechanism, said password validation mechanism providing simultaneous feedback to a user regarding validity of a password string for more than one resource.
10. The program product of claim 9 wherein said password validation mechanism simultaneously provides feedback for each of said more than one resource.
11. The program product of claim 9 wherein said password validation mechanism simultaneously provides feedback for each resource using more than one visual cue.
12. The program product of claim 11 wherein said more than one visual cue is selected from the group consisting of icon presentation, message presentation, and character highlighting.
13. A method for providing feedback to a user, said method comprising the steps of:
receiving input information from said user;
checking whether said input information conforms with certain syntactical requirements; and
presenting said user with feedback regarding more than one syntactic requirement, said feedback being simultaneously provided for each of said more than one syntactic requirement.
14. The method of 13, wherein said input information is a password string and wherein said checking and presenting steps are performed by a password validation mechanism.
15. A method for providing feedback to a user, said method comprising the steps of:
receiving a password string from said user;
checking whether said password string conforms with certain requirements for more than one password-protected resource; and
presenting said user with feedback regarding said certain requirements for each of said more than one resource.
16. The method of claim 15 wherein said presenting step involves simultaneously providing feedback for each of said more than one resource.
17. The method of claim 15 wherein said presenting step involves simultaneously providing feedback for each resource using more than one visual cue.
18. The method of claim 17 wherein said more than one visual cue is selected from the group consisting of icon presentation, message presentation, and character highlighting.
US09/838,619 2001-04-19 2001-04-19 Syntax checker with real-time feedback Expired - Fee Related US7240339B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US09/838,619 US7240339B2 (en) 2001-04-19 2001-04-19 Syntax checker with real-time feedback
CA002376341A CA2376341A1 (en) 2001-04-19 2002-03-12 Syntax checker with real-time feedback

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/838,619 US7240339B2 (en) 2001-04-19 2001-04-19 Syntax checker with real-time feedback

Publications (2)

Publication Number Publication Date
US20020157025A1 true US20020157025A1 (en) 2002-10-24
US7240339B2 US7240339B2 (en) 2007-07-03

Family

ID=25277601

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/838,619 Expired - Fee Related US7240339B2 (en) 2001-04-19 2001-04-19 Syntax checker with real-time feedback

Country Status (2)

Country Link
US (1) US7240339B2 (en)
CA (1) CA2376341A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1024611C2 (en) * 2003-10-24 2005-04-27 Yesco Nederland B V Processing information in computer system, provides user with visual display of status of information being processed
EP1657855A1 (en) * 2004-11-12 2006-05-17 Hewlett-Packard Development Company, L.P. System and method for setting up a peripheral device for use in a wireless network
US20070124601A1 (en) * 2005-11-30 2007-05-31 Mona Singh Methods, systems, and computer program products for entering sensitive and padding data using user-defined criteria
US20080172715A1 (en) * 2007-01-12 2008-07-17 Microsoft Corporation Scalable context-based authentication
US20090073315A1 (en) * 2000-12-04 2009-03-19 Jlb Ventures Llc Method and System for Identifying Addressing Data Within a Television Presentation
US20110231914A1 (en) * 2006-02-01 2011-09-22 Research In Motion Limited System and method for validating a user of an account using a wireless device

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3956130B2 (en) * 2002-12-25 2007-08-08 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication device, authentication system, authentication method, program, and recording medium
US8024791B2 (en) * 2008-05-30 2011-09-20 Microsoft Corporation Providing hints while entering protected information
JP5858641B2 (en) * 2011-05-10 2016-02-10 キヤノン株式会社 Information processing apparatus, system including information processing apparatus and external apparatus, system control method, and program
US9122371B2 (en) 2013-03-08 2015-09-01 Qualcomm Incorporated Displaying an icon based upon user input
US9292713B2 (en) * 2013-03-13 2016-03-22 Intel Corporation Tiered access to on chip features

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643784B1 (en) * 1998-12-14 2003-11-04 Entrust Technologies Limited Password generation method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643784B1 (en) * 1998-12-14 2003-11-04 Entrust Technologies Limited Password generation method and system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8599309B2 (en) 2000-12-04 2013-12-03 Jlb Ventures Llc Method and system for identifying addressing data within a television presentation
US8130320B2 (en) * 2000-12-04 2012-03-06 Jlb Ventures Llc Method and system for identifying addressing data within a television presentation
US20090073315A1 (en) * 2000-12-04 2009-03-19 Jlb Ventures Llc Method and System for Identifying Addressing Data Within a Television Presentation
NL1024611C2 (en) * 2003-10-24 2005-04-27 Yesco Nederland B V Processing information in computer system, provides user with visual display of status of information being processed
EP1657855A1 (en) * 2004-11-12 2006-05-17 Hewlett-Packard Development Company, L.P. System and method for setting up a peripheral device for use in a wireless network
US20110119496A1 (en) * 2005-11-30 2011-05-19 Mona Singh Methods, Systems, And Computer Program Products For Entering Sensitive And Padding Data Using User-Defined Criteria
US7890768B2 (en) 2005-11-30 2011-02-15 Scenera Technologies, Llc Methods, systems, and computer program products for entering sensitive and padding data using user-defined criteria
US8078882B2 (en) 2005-11-30 2011-12-13 Scenera Technologies, Llc Methods systems, and computer program products for entering sensitive and padding data using user-defined criteria
US8341420B2 (en) 2005-11-30 2012-12-25 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for entering sensitive and padding data using user-defined criteria
US20070124601A1 (en) * 2005-11-30 2007-05-31 Mona Singh Methods, systems, and computer program products for entering sensitive and padding data using user-defined criteria
US20110231914A1 (en) * 2006-02-01 2011-09-22 Research In Motion Limited System and method for validating a user of an account using a wireless device
US8683550B2 (en) * 2006-02-01 2014-03-25 Blackberry Limited System and method for validating a user of an account using a wireless device
US9125056B2 (en) 2006-02-01 2015-09-01 Blackberry Limited System and method for validating a user of an account for a wireless device
US20080172715A1 (en) * 2007-01-12 2008-07-17 Microsoft Corporation Scalable context-based authentication

Also Published As

Publication number Publication date
CA2376341A1 (en) 2002-10-19
US7240339B2 (en) 2007-07-03

Similar Documents

Publication Publication Date Title
US6085206A (en) Method and system for verifying accuracy of spelling and grammatical composition of a document
US10838569B2 (en) Method and apparatus for user interface non-conformance detection and correction
US6326953B1 (en) Method for converting text corresponding to one keyboard mode to text corresponding to another keyboard mode
US9805005B1 (en) Access-control-discontinuous hyperlink handling system and methods
US5940847A (en) System and method for automatically correcting multi-word data entry errors
US8327285B2 (en) Virtual keyboard text replication
US5634121A (en) System for identifying and linking domain information using a parsing process to identify keywords and phrases
AU2003204478B2 (en) Method and system for associating actions with semantic labels in electronic documents
US7293229B2 (en) Ensuring proper rendering order of bidirectionally rendered text
US6012075A (en) Method and system for background grammar checking an electronic document
US7721203B2 (en) Method and system for character sequence checking according to a selected language
US7103835B1 (en) Process builder for a routable electronic document system and method for using the same
US20020184266A1 (en) Universal file format for products that allows both parametric and textual searching
EP0178499A2 (en) Data entry screen
EP3084576A1 (en) Methods and apparatus for electronic document handling
US7240339B2 (en) Syntax checker with real-time feedback
US20020113810A1 (en) Error and tip information text messaging
US20070033524A1 (en) Mapping codes for characters in mathematical expressions
US20020143772A1 (en) Matrix-based user interface and system for creating the same
US20080269919A1 (en) Bringing user attention to guidance information presented on a display device
Forta MariaDB crash course
KR0142163B1 (en) Character code converter
CN114072787A (en) System and method for fast data entry to facilitate document review
US7284205B2 (en) Providing multiple input bindings across device categories
US20080120317A1 (en) Language processing system

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CRAGUN, BRIAN J.;HINTERMEISTER, GREGORY R.;REEL/FRAME:011736/0317

Effective date: 20010419

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20190703